public marks

PUBLIC MARKS from alamat with tags tips & unix

2016

2010

Linux Tip for the Day: Monitoring root in the password file

(via)
One of the popularly known method of breaking into a Unix host is by inserting a uid value 0 in the /etc/passwd file which could be done in many ways including backdoors for later accesses .

Linux Tip for the Day: Kill X

(via)
Quick way to close your X login session (for SysV) for PID in `ps -u$USER | grep “fv[wm]” | awk ‘{print $1}’`; do kill -9 $PID; done Or throw it into a shell script:

How Do I Scan My Linux System For Rootkits, Worms, Trojans, Etc.?

(via)
Either install the package that comes with your distribution (on Debian you would run apt-get install chkrootkit

2009

Rebooting Because of Fork Bombs

(via)
There is nothing more frustrating for an Administrator who has to reboot system due to fork bomb

Building a Linux supercomputer using SSH and PVM

(via)
If you have a couple of old Linux boxes sitting around, then you’ve got the makings of a supercomputer. Dust them off, install Secure Shell (SSH)

NFS between Solaris & Linux

(via)
If you receive error messages such as “unknown version” when attempting to mount a Linux based NFS server from Solaris

Separate Shell Command history

(via)
One other suggestion on how to separate shell command history files by terminal (It works on HP-UX):

How To Set Up Database Replication In MySQL

(via)
This tutorial describes how to set up database replication in MySQL. MySQL replication allows you to have an exact copy of a database from a master server on another server (slave), and all updates to the database on the master server are immediately replicated to the database on the slave server so that both databases are in sync.

2008

Linux Tip of the Day - Reset MYSQL password

If you forgot your mysql password and you have root access, just follow this steps.

Linux Tip of the Day - Transferring mulibyte files

Do you find trouble in transferring multibyte binary data files to Windows and then read through HexEditor ?

Linux Tip of the Day - Find and edit strings

Ever found a need to find for a particular string across the file system and edit all those files which contains that particular string?? Here is a simple way.

Linux Tip of the Day - Removing files with bad filenames

If a file has a special character, Unix will try to interpret the character. Renaming these type of files cannot be done with a simple “mv”…..it will have to be done using the file’s inode.

Linux Tip of the Day - tail with color

(via)
Here is how to monitor a growing file and have it highlight a KEYWORD:

Carrots are good for you

(via)
Most often when we try to execute a command at the shell we do some mistakes like missing out a char or misspelling it.

2006

Adding disk on Linux

Linux hard disk device names follow a specific standard. SCSI disks all start with sd and IDE disks with hd. After this comes a letter that identifies the unit number of the disk, so for example, the first disk would be a, the second would be b, the third would be c, and so on.

Protecting content with .htaccess files

.htaccess files are very versatile, and can easily become very complex. This document contains enough information to set simple access restrictions/limits on a directory in your web space. Remember to upload .htaccess files, and .htpasswd files using ASCII mode. This is an option is available in most FTP clients.

Adding Additional Hard drive on your Linux Machine

Normally one would ask? how do i add additional harddrive to my linux box.. well we could make use of utilities like fdisk, cfdisk or QtParted but it is fdisk that is im going to discuss below.

Some Unix Tips

These are some unix tips that might be helpful someday down the road. Feel free to contribute more unix tips by commenting on this article.

Virtual Hosting With Proftpd And MySQL (Incl. Quota)

This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota with this setup.

Writing Linux firewall rules w/ IPTables

The Linux kernel, since version 2.0, has included the capabilities to act as a firewall. In those days, the kernel module was called ipfwadm and was very simple. With the 2.2 kernel, the firewall module became called ipchains and had greater capabilities than its predecessor. Today, we have IPTables, the firewall module in the kernel since the 2.4 days. IPTables was built to take over ipchains, and includes improvements that now allow it to compete against some of the best commercial products available in the market. This guide will give you some background on IPTables and how to use it to secure your network.

alamat's TAGS related to tag tips

apple +   apps +   battery +   blog +   bombs +   computer +   crontab +   database +   day +   distro +   evernote +   file +   files +   firewall +   fork +   from +   guides +   hacking +   help +   hidden +   how-to +   howto +   improve +   ip +   ipad +   iphone +   ipod +   itunes +   kill +   laptop +   life +   lifestyle +   linux +   lives +   logins +   logout +   losers +   mac +   mobile +   monitor +   mysql +   network +   news +   nfs +   osx +   password +   personal +   programming +   PVM +   reboot +   remember +   replication +   root +   rootkit +   sample +   saved +   script +   security +   shell +   solaris +   spam +   spammers +   ssh +   supercomputer +   support +   system +   tech +   techy +   tools +   touch +   tracking +   trick +   tricks +   trojan +   tutorial +   unix +   user +   value +   view +   windows +   wireless +   worm +   x +